Month: August 2022

UTM (Unified threat management) is thought to be an all-in-one solution for cybersecurity. In general, it is a versatile software or hardware firewall solution integrated with IPS (Intrusion Prevention System) and other security services. A universal gateway allows the user to manage network security with one comprehensive solution, which makes the task much easier. In
0 Comments
WhatsApp has released a new native desktop app for Windows. Earlier, the instant messaging platform only offered web-based apps for Mac and Windows operating system. WhatsApp claims that the native app will increase reliability and speed. Users will continue to receive notifications and messages even if their smartphone is offline, the company added. The process
0 Comments
Chinese scientists have generated the strongest steady magnetic field, breaking all previous records. The world’s most powerful, steady magnetic field was achieved using a hybrid magnet that produced a magnetic field of 45.22 tesla (T), which is a million times stronger than our planet’s own magnetic field. The record was set at the Steady High Magnetic Field Facility
0 Comments
Apple’s suppliers are in talks to produce Apple Watch and MacBook in Vietnam for the first time, Nikkei Asia reported on Tuesday, citing people familiar with the matter. Apple’s Chinese suppliers Luxshare Precision Industry and iPhone assembler Foxconn have started test production of Apple Watch and MacBook in Northern Vietnam, the report added. Apple has
0 Comments
Over-the-counter hearing aids will for the first time be available to tens of millions of Americans, officials said Tuesday, in an effort to cut prices from $5,000 (roughly Rs. 3,96,400) a pair. ”For many Americans who suffer from hearing loss, safe and effective and high-quality hearing aids have been unaffordable,” US health secretary Xavier Becerra told
0 Comments
A group of researchers has revealed details of a new vulnerability affecting Intel CPUs that enables attackers to obtain encryption keys and other secret information from the processors. Dubbed ÆPIC Leak, the weakness is the first-of-its-kind to architecturally disclose sensitive data in a manner that’s akin to an “uninitialized memory read in the CPU itself.”
0 Comments
Cybersecurity researchers have elaborated a novel attack technique that weaponizes programmable logic controllers (PLCs) to gain an initial foothold in engineering workstations and subsequently invade the operational technology (OT) networks. Dubbed “Evil PLC” attack by industrial security firm Claroty, the issue impacts engineering workstation software from Rockwell Automation, Schneider Electric, GE, B&R, Xinje, OVARRO, and
0 Comments